5.2 Index of Security Parameters
This protocol does not explicitly control the security parameters that are used to protect the data; however, it does configure the IPsec component, which is a group of security parameter settings.
|
Security parameter |
Section |
|---|---|
|
IKE MM Diffie-Hellman groups |
ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1) |
|
IKE MM encryption algorithms |
ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1) |
|
IKE MM integrity algorithms |
ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1) |
|
IKE MM key lifetimes |
ipsecISAKMPPolicy{GUID} Object Attribute Descriptions (section 2.2.1.2.1) |
|
IKE authentication method (PSK, X.509 certificate, Kerberos) |
|
|
Traffic protection to enact (permit, block, and secure with IPsec) |
ipsecNegotiationPolicy Object Attribute Details (section 2.2.1.4) |
|
IPsec QM key lifetimes |
ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1) |
|
IPsec framing method (ESP or AH) |
ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1) |
|
IPsec encryption algorithms |
ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1) |
|
IPsec integrity algorithms |
ipsecNegotiationPolicy{GUID} Object Description (section 2.2.1.4.1) |